1.1 The result of the expression 7 MOD 5 + 10 DIV 3:
A
B
C
D
1.1.2 A digital signature is used …
A when someone signs an electronic document - NSC Information Technology - Question 1 - 2017 - Paper 2
Question 1
1.1 The result of the expression 7 MOD 5 + 10 DIV 3:
A
B
C
D
1.1.2 A digital signature is used …
A when someone signs an electronic document.
B to ident... show full transcript
Worked Solution & Example Answer:1.1 The result of the expression 7 MOD 5 + 10 DIV 3:
A
B
C
D
1.1.2 A digital signature is used …
A when someone signs an electronic document - NSC Information Technology - Question 1 - 2017 - Paper 2
Step 1
The result of the expression 7 MOD 5 + 10 DIV 3:
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
To solve the expression, we first calculate each part:
Calculate 7 MOD 5:
The remainder when 7 is divided by 5 is 2.
Calculate 10 DIV 3:
The integer division of 10 by 3 gives 3 (since 10 divided by 3 equals 3 with a remainder of 1).
Finally, add the two results together:
2 + 3 = 5.
Thus, the answer is D.
Step 2
A digital signature is used …
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A digital signature is primarily used to identify the sender of an electronic message (option B). It ensures the integrity and authenticity of the sender.
Step 3
A Trojan virus is designed to …
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A Trojan virus is designed to appear useful while actually causing harm, therefore, the correct answer is D.
Step 4
A technique used to make electronic communication appear to originate from a legitimate source is known as …
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
This technique is referred to as spoofing (option B), which involves impersonating a legitimate source.
Step 5
To establish a relationship between two tables in a database, a link must be made from the …
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The link must be made from the primary key to the foreign key (option D) to maintain referential integrity.
Step 6
The amount of data an ISP allows a user to upload and download in a particular time period
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
This is known as a CAP/Data bundle.
Step 7
A website that is regularly updated with news and events in chronological order
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Such a website is referred to as a Blog/Weblog.
Step 8
A person who breaks into a system to steal data electronically or to make unauthorized changes to electronic data
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
This person is commonly known as a Cracker/Hacker.
Step 9
An Internet service that translates a domain name to an IP address, e.g. www.abcd.com translates to 169.150.100.123
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
This service is known as DNS (Domain Name System).
Step 10
The protocol used for secure encrypted transfer of data on the Internet
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
This protocol is referred to as HTTPS/SSL.
Step 11
The process whereby the existing firmware is wiped and replaced by an updated version
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
This process is known as flashing the ROM.
Step 12
An Internet-based alternative to text messaging, in which multimedia can be exchanged in real time via applications, such as WhatsApp
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
This is referred to as Instant messaging (IM).
Step 13
A common format for storing digital music by combining efficient compression techniques and good quality sound
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
This format is known as MP3 (MPEG-1 Audio Layer 3).
Step 14
Gaining unauthorized access to a network and making use of a connection in an unauthorized way to access a secured Wi-Fi network
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
This practice is known as Piggybacking.
Step 15
The process of self-checking by a computer when it is powered on
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
This process is known as POST (Power-on self-test).